gutenprint_5.2.12~pre3-1_source.changes uploaded successfully to localhost
along with the files:
gutenprint_5.2.12~pre3-1.dsc
gutenprint_5.2.12~pre3.orig.tar.bz2
gutenprint_5.2.12~pre3-1.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 05 Oct 2016 09:21:45 +0200
Source: gutenprint
Binary: gimp-gutenprint printer-driver-gutenprint libgutenprint-dev
libgutenprint-doc libgutenprint2 libgutenprintui2-dev libgutenprintui2-1
gutenprint-locales escput
foomatic-db_20161005-1_source.changes uploaded successfully to localhost
along with the files:
foomatic-db_20161005-1.dsc
foomatic-db_20161005.orig.tar.xz
foomatic-db_20161005-1.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
On 4 October 2016 at 17:19, Till Kamppeter wrote:
> Thank you very much for the patch. I have applied it to the upstream BZR
> repository now (rev. 7541).
Perfect, thanks.
> Note that I had to do a little fix on the patch. The original one applied
> both the BrowseInterval and BrowseTimeout dire
cups_2.2.1-1_source.changes uploaded successfully to localhost
along with the files:
cups_2.2.1-1.dsc
cups_2.2.1.orig.tar.gz
cups_2.2.1.orig.tar.gz.asc
cups_2.2.1-1.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
Your message dated Wed, 05 Oct 2016 10:19:27 +
with message-id
and subject line Bug#711697: fixed in cups 2.2.1-1
has caused the Debian Bug report #711697,
regarding libcupsfilters1 has circular Depends on libcupsimage2
to be marked as done.
This means that you claim that the problem has been
Your message dated Wed, 05 Oct 2016 10:19:27 +
with message-id
and subject line Bug#837936: fixed in cups 2.2.1-1
has caused the Debian Bug report #837936,
regarding cups FTCBFS: runs host architecture utilities during build
to be marked as done.
This means that you claim that the problem has
Your message dated Wed, 05 Oct 2016 10:19:27 +
with message-id
and subject line Bug#838854: fixed in cups 2.2.1-1
has caused the Debian Bug report #838854,
regarding cups-bsd: Typos in man pages
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is n
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 05 Oct 2016 11:32:06 +0200
Source: cups
Binary: libcups2 libcupsimage2 libcupscgi1 libcupsmime1 libcupsppdc1 cups
cups-core-drivers cups-daemon cups-client cups-ipp-utils libcups2-dev
libcupsimage2-dev cups-bsd c
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 05 Oct 2016 09:59:11 +0200
Source: foomatic-db
Binary: foomatic-db foomatic-db-compressed-ppds openprinting-ppds
Architecture: source
Version: 20161005-1
Distribution: unstable
Urgency: medium
Maintainer: Debian
On Mon 03 Oct 2016 at 21:21:47 +0200, Narcis Garcia wrote:
> El 03/10/16 a les 11:42, Didier 'OdyX' Raboud ha escrit:
> > Le lundi, 3 octobre 2016, 11.36:19 h CEST Narcis Garcia a écrit :
> >> FOSS packages in Debian repositories lack of proprietary binaries
> >> provided by HP. When user chooses
clone 839260 -1
retitle -1 ghostscript: .libfile doesn't check PermitFileReading array,
allowing remote file disclosure
forwarded -1 http://bugs.ghostscript.com/show_bug.cgi?id=697169
retitle 839260 ghostscript: various userparams allow %pipe% in paths, allowing
remote shell command execution
for
Processing commands for cont...@bugs.debian.org:
> clone 839260 -1
Bug #839260 [ghostscript] ghostscript: various sandbox bypasses
Bug 839260 cloned as bug 839841
> retitle -1 ghostscript: .libfile doesn't check PermitFileReading array,
> allowing remote file disclosure
Bug #839841 [ghostscript]
Source: ghostscript
Version: 9.19~dfsg-3
Severity: grave
Tags: security upstream
Forwarded: http://bugs.ghostscript.com/show_bug.cgi?id=697179
Hi
See:
Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697179
Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697179#c0
Patch:
http:/
Source: ghostscript
Version: 9.19~dfsg-3
Severity: grave
Tags: security upstream patch
Forwarded: http://bugs.ghostscript.com/show_bug.cgi?id=697190
Hi
See:
Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697190
Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697190#c0
Patch:
Processing commands for cont...@bugs.debian.org:
> retitle 839846 ghostscript: CVE-2016-7979: type confusion in
> .initialize_dsc_parser allows remote code execution
Bug #839846 [src:ghostscript] ghostscript: type confusion in
.initialize_dsc_parser allows remote code execution
Changed Bug title
Processing commands for cont...@bugs.debian.org:
> found 839845 9.06~dfsg-2
Bug #839845 [src:ghostscript] ghostscript: CVE-2016-7978: reference leak in
.setdevice allows use-after-free and remote code execution
Marked as found in versions ghostscript/9.06~dfsg-2.
> thanks
Stopping processing here
Processing commands for cont...@bugs.debian.org:
> found 839846 9.06~dfsg-2
Bug #839846 [src:ghostscript] ghostscript: CVE-2016-7979: type confusion in
.initialize_dsc_parser allows remote code execution
Marked as found in versions ghostscript/9.06~dfsg-2.
> thanks
Stopping processing here.
Plea
Processing commands for cont...@bugs.debian.org:
> found 839841 9.06~dfsg-2
Bug #839841 [ghostscript] ghostscript: CVE-2016-7977: .libfile doesn't check
PermitFileReading array, allowing remote file disclosure
Marked as found in versions ghostscript/9.06~dfsg-2.
> thanks
Stopping processing here.
19 matches
Mail list logo